File name:

JRT.exe

Full analysis: https://app.any.run/tasks/050ee029-a444-45d6-9c4f-2e6a44cfdc04
Verdict: Malicious activity
Analysis date: October 23, 2023, 15:33:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

E40542C4CC75E658A4615BFEFB308570

SHA1:

961A8C8C332494201E4F275FE1F50ABAE99140B3

SHA256:

2000ACF98EF0AC1A2D75C91586B5F30A2BC3ECE6E92388B324614C93A0645CF5

SSDEEP:

98304:ofPy7aaBPMFofjtZ7dvirsNhwx5SWAxVILeVnW7Hlr8AKpG7l6I3keTo7HUlmn1m:Agd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • WGET.DAT (PID: 568)
    • Drops the executable file immediately after the start

      • JRT.exe (PID: 1484)
  • SUSPICIOUS

    • Reads the Internet Settings

      • JRT.exe (PID: 1484)
    • Application launched itself

      • cmd.exe (PID: 584)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 584)
      • JRT.exe (PID: 1484)
    • Executing commands from a ".bat" file

      • JRT.exe (PID: 1484)
    • Starts application with an unusual extension

      • cmd.exe (PID: 584)
  • INFO

    • Create files in a temporary directory

      • JRT.exe (PID: 1484)
    • Checks supported languages

      • JRT.exe (PID: 1484)
      • WGET.DAT (PID: 568)
    • Reads the computer name

      • JRT.exe (PID: 1484)
      • WGET.DAT (PID: 568)
    • The executable file from the user directory is run by the CMD process

      • WGET.DAT (PID: 568)
    • Reads the machine GUID from the registry

      • WGET.DAT (PID: 568)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:06:27 09:06:38+02:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 70656
InitializedDataSize: 52224
UninitializedDataSize: -
EntryPoint: 0x11def
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.1.4.0
ProductVersionNumber: 8.1.4.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Malwarebytes
FileDescription: Junkware Removal Tool
FileVersion: 8.1.4
ProductVersion: 8.1.4
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
14
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start jrt.exe cmd.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs ping.exe no specs wget.dat fc.exe no specs jrt.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
316REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v ProductName C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
568"C:\Users\admin\AppData\Local\Temp\jrt\WGET.DAT" -q "http://data-cdn.mbamupdates.com/v1/tools/jrt/jrtnewmd5"C:\Users\admin\AppData\Local\Temp\jrt\WGET.DAT
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\jrt\wget.dat
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
584C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\jrt\get.bat" "C:\Windows\System32\cmd.exeJRT.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1484"C:\Users\admin\AppData\Local\Temp\JRT.exe" C:\Users\admin\AppData\Local\Temp\JRT.exe
explorer.exe
User:
admin
Company:
Malwarebytes
Integrity Level:
HIGH
Description:
Junkware Removal Tool
Exit code:
0
Version:
8.1.4
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1824"C:\Users\admin\AppData\Local\Temp\JRT.exe" C:\Users\admin\AppData\Local\Temp\JRT.exeexplorer.exe
User:
admin
Company:
Malwarebytes
Integrity Level:
MEDIUM
Description:
Junkware Removal Tool
Exit code:
3221226540
Version:
8.1.4
Modules
Images
c:\users\admin\appdata\local\temp\jrt.exe
c:\windows\system32\ntdll.dll
1904C:\Windows\system32\net1 session C:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\sechost.dll
c:\windows\system32\netutils.dll
2100C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName" /v ComputerName 2>NULC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\cmd.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\imm32.dll
2448net session C:\Windows\System32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\netutils.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\samcli.dll
c:\windows\system32\rpcrt4.dll
2464FC "C:\Users\admin\AppData\Local\Temp\jrt\jrtnewmd5" "C:\Users\admin\AppData\Local\Temp\jrt\jrtcurrentmd5" C:\Windows\System32\fc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DOS 5 File Compare Utility
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\fc.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ulib.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
2952FIND "Windows XP" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\usp10.dll
Total events
1 158
Read events
1 150
Write events
8
Delete events
0

Modification events

(PID) Process:(1484) JRT.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1484) JRT.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1484) JRT.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1484) JRT.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
13
Suspicious files
2
Text files
31
Unknown types
0

Dropped files

PID
Process
Filename
Type
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\bl_chrstrg.cfgtext
MD5:EBDFDE9F11720DFC627933F37E8AE319
SHA256:613DEC5AE47C9FCC4EFF4E50FE811FD41A9442796A57DBB0E63FBE36178C0663
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\bl_appinit.cfgtext
MD5:CC6A968CCDA289BE7B69E039646D0BC9
SHA256:95691814D105108152B96E41D0F0FF30462D0A060AF32431089C312604C235B6
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\nfo\shortcut.txttext
MD5:3A26827485C683AACD1E0194F34A0CFA
SHA256:094E2FA2C6DF5FEE039BA345067BA5B2C22E8C54CA4A8D7B35E86A91C1E8E320
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\nfo\NirCmd.chmbinary
MD5:66729EFE2819E71C060AF7FD49732C28
SHA256:E050308C4A297F637A848109D719C65A62F6AB6ED0D854D026CC2DF257515D32
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\nfo\sed.txttext
MD5:13171419A6D180FDD8B52CEAE16DDADF
SHA256:C8A8A4818146DD8960849C2B028E565A94C8D4E036E01E1E28E0FA91D42C7E43
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\clean_shortcut.vbstext
MD5:FA73FE2C0D3C62E8732A71282E2E491C
SHA256:449B9F2DC6B67A6ECCF0FBE16FF91AF50EFB57E0978393A2C3F1B3FAFD1189D9
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\get.battext
MD5:6142E0A5C78FA8B63993357AF48D7AB9
SHA256:F793FA295E1598556A6B91EB73B68D825D5EDBCB0A764D9D58A570A6A4B5BF0F
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\bl_foldersC.cfgtext
MD5:AE4C96D8F463036C8EFEA6A0565C2F50
SHA256:69EB2C63BAB14F7E91CA4483E741583D8F6B8994F79C53FDF17CE6AF7774738F
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\bl_chrext.cfgtext
MD5:935ED2949D1ECEAC23C52564CBA49529
SHA256:DBEDB3193DDA09AC6DF38A640A08BEE54041D020D46223AD7B3F297E4253360F
1484JRT.exeC:\Users\admin\AppData\Local\Temp\jrt\bl_ffplugin.cfgtext
MD5:6C0A5B19478B5CC273E9DE5C2AA0E165
SHA256:691E2F088E116FF729CF64535C2FE4389D0000A7DA8D4FBF1DA4C7CBD6D451F8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
4
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
568
WGET.DAT
GET
301
65.9.66.47:80
http://data-cdn.mbamupdates.com/v1/tools/jrt/jrtnewmd5
unknown
html
167 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
568
WGET.DAT
65.9.66.47:80
data-cdn.mbamupdates.com
AMAZON-02
US
unknown
568
WGET.DAT
65.9.66.47:443
data-cdn.mbamupdates.com
AMAZON-02
US
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
www.google.com
  • 142.250.184.132
whitelisted
data-cdn.mbamupdates.com
  • 65.9.66.47
  • 65.9.66.84
  • 65.9.66.85
  • 65.9.66.107
whitelisted

Threats

No threats detected
No debug info